پديد آورنده :
چاكري يزدي، مژگان
عنوان :
كنترل دسترسي و رمزنگاري مبتني بر شاخصه در شبكههاي مه بر بستر زنجيرهي بلوكي
مقطع تحصيلي :
كارشناسي ارشد
محل تحصيل :
اصفهان : دانشگاه صنعتي اصفهان
صفحه شمار :
سيزده، 107 ص.: مصور، جدول، نمودار
استاد راهنما :
علي فانيان
استاد مشاور :
مريم موزراني
توصيفگر ها :
شبكه هاي اينترنت اشيا و مه , رمزنگاري و كنترل دسترسي شاخصه اي , اشتراك كليد رمز شامير , زنجيره ي بلوكي , قرارداد هوشمند
استاد داور :
محمدحسين منشئي، محمد دخيل عليان
تاريخ ورود اطلاعات :
1399/11/04
رشته تحصيلي :
مهندسي كامپيوتر
دانشكده :
مهندسي برق و كامپيوتر
تاريخ ويرايش اطلاعات :
1399/11/28
چكيده فارسي :
۲۰۱ پيشنهادها ۶ ۲ ۳۰۱ مر جع ۸۰۱ چكيده نگليسي نه
چكيده انگليسي :
Attribute based Access Control and Encryption in Fog Networks based on Blockchain Mojgan Chakeri Yazdi m chakeriyazdi@ec iut ac ir 2020 Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan 84156 83111 Iran Degree M Sc Language Farsi Supervisor Dr Ali Fanian Advisor Dr Maryam MouzaraniAbstract Fog computing in IoT networks provides many advantages such as less latency and more quality of network resourcemanagement in comparison to cloud based IoT Although there is an important performance in this technology fog comput ing confronts some security challenges in using access control and data encryption Therefore ciphertext policy attribute based encryption CP ABE is one of the most suitable models that can be used in fog computing to overcome these securitychallenges To this end in this thesis we propose a new model based on CP ABE and permissioned blockchain In our method the Shamir secret sharing algorithm is used to distribute the keys among the authorities and in the per missioned blockchain platform In this model Fog servers keys are distributed in the blockchain based on established rulesin smart contracts The end users keys are also distributed among authorities This process provides a distributed multi authorities structure to reduce the risk of security attacks that are occurred by compromising the authorities Furthermore the outsourcing of the decryption phase to the fog layer provides quality and security in the proposed model The security of the proposed model is proven by designing a security model based on the q linear Diffie Hellmanassumption The proposed model is robust against some security attacks such as the collusion attack The resilience ofthe model is compared with three state of the art approaches Storage and computing overhead orders are also calculatedto evaluate the system performance The security and performance analysis show that the proposed model has a suitableperformance Key Words Fog computing and networks Attribute based encryption and access control Shamir ssecret sharing Blockchain Smart contract
استاد راهنما :
علي فانيان
استاد مشاور :
مريم موزراني
استاد داور :
محمدحسين منشئي، محمد دخيل عليان